How Common Are Prosecutions For Data Breaches?
The UK legislation on what data security measures should be in place and who to report a suspected breach to is covered by GDPR. …
Passkey Verification
Passkey verification is starting to move away from bespoke network access solutions to a wider Internet access model. It is supported by IOS 16 …
Fighting Fake Reviews
Kindus has already discussed the UK Digital Markets, Competition and Consumers Bill which includes provisions to ensure that sites take reasonable steps to ensure …
UK Smart Device Security Law
The UK Product Security and Telecommunications Infrastructure (Product Security) regime will come into force on 29th April 2024. This aims to improve security software …
Smart Speaker Data Leaks
Amazon Alexa, Apple Siri and Google Assistant all offer voice activated assistance. Similar technology such as the Ring doorbell also include cameras so can …
Shoulder Surfing Mobile Device Fraud
With increasing use of mobile devices for banking and contactless payment a small but significant threat has emerged from loss of the phone together …
TikTok Restrictions
Following a security review the UK announced in March 2023 that TikTok would be banned on government devices. While this action has some elements …
Cyber Essentials 2023 Changes
Cyber Essentials the UK cyber security certification is to be updated on 24th April 2023. This will mean new questions but existing certifications will …
Protective Domain Name Service (PDNS)
PDNS is designed to protect networks from malicious websites by looking up the IP address of sites that a system tries to access against …
DMARC Email Protection
Fraudsters and scammers often send email by falsifying the sender’s address. If the sender appears to be trustworthy then the recipient is more likely …
Browser Vulnerabilities
The Chrome browser and its derivatives Opera and Edge were recently (January 2023) found to be vulnerable to Symstealer an attack that can be …
Password Manager Risks
It would be hard to argue against the case for password managers. Instead of needing to remember numerous passwords or even worse using the …
Protecting Networked Devices
IoT devices have become an important part of the communications infrastructure. Consider for example routers, printers, web cams or industrial control devices. In the …
PayPal Security Loophole
Criminals see PayPal related messages as an easy route for fraud. Many such requests are quick to spot as they do not relate to …
Evaluating the Threat from Quantum Computing
The core principle of most computer encryption is not that a code cannot be broken but that the time required to guess the key …
Digital Advertising Fraud
The most efficient way to host advertising on web pages or social media is through some form of programmatic advertising. The owner (publisher) of …
Qatar World Cup Cyber Attacks
It is no surprise that a major International event such as the 2022 World Cup would be a magnet for fraudsters and scammers. This …
Mastodon Security
Some Twitter users have been considering moving to other, similar, platforms. Twitter has a massively larger subscriber base than any of the alternative services. …
Home Phones at Work?
There needs to be a clear line between device use for personal and work purposes. This will include phone calls, emails and application use. …
Social Media Workplace Risks
For many young and not so young workers social media is an important part of their lifestyle. They do not simply want to consume …